Chief Information Security Officer (CISO) Permanent Hire Location: Austin, TX
Overview Reporting to the CIO, the CISO is a key member of the leadership team and responsible for the security of data, information assets, applications, and infrastructure. The CISO will be accountable for the successful implementation of well-defined security projects, and operational practices related to information security.
Qualifications
10 years of experience in Information Security roles of progressively increasing responsibility
5-7 years of experience leading a Cybersecurity organization in a regulated industry
5+ years in a technology leadership role requiring project and operational budgeting experience
Certified Information Systems Security Professional (CISSP) and ITIL certification preferred
Required Education
Bachelor's degree in a Technology or Business-related field of study such as Computer Science, Information Technology, Business or Business Information Systems
Knowledge
Strong working knowledge of various data security frameworks, including NIST, ISO and SOC
Expert knowledge of the key concepts in user and identity access management (IAM)
Working knowledge of security governance risk and compliance (GRC)
Knowledge of data privacy regulations, including FERPA or similar regulated data classifications
Knowledge of best practices in security training and awareness
Strong knowledge of tools and techniques for data security and data recovery
Knowledge of ITIL-based IT Service Management (ITSM) concepts.
Responsibilities
Leading and successfully completing projects on time and within budget
Building out and maintaining an information security team
Mitigating risks associated with data breaches and data leaks
Establishing, maintaining, and continuously testing infrastructure aimed at operational recovery from outages related to cybersecurity incidents
Continual testing of the organization’s environment for security vulnerabilities
Staying current on risks and trends in cybersecurity and helping develop the technology roadmap
Defining operating models for the information security team using the ITIL framework and ITSM tools
Establishing and managing relationships with 3rd party product and service providers to meet goals
Establishing and/or maturing formal standards and practices in the following areas:
Identity & Access Management (IAM)
Secure data capture, storage, transfer, and retrieval
Data security policy development, training, and risk management
Genius Road, LLC is proud to be a Certified Women’s Business Enterprise, an Equal Opportunity Employer and values diversity. All employment is decided on the basis of qualifications, merit and business need.